The rise of public cloud infrastructure and remote work have weakened network-based models of security. The network-first models have been replaced by the tenets of Zero Trust and Least Privilege. A core component of Zero Trust is placing user identity and associated entitlements at the center of security. It is now common to hear the refrain: ”Identity is the new perimeter.”
But, if identity is the new perimeter, why are we struggling to defend it? In the last 18 months, hackers have leveraged identity-based attacks to accomplish high profile and costly attacks on major brands. To help organizations bolster their identity perimeter, this webinar will cover core concepts of modern identity infrastructure and how attackers are targeting those components.
Ted Kietzman, Product Marketing Manager
Ted researches trends in the cybersecurity industry with a focus on identity and access management. He has particular interest in the adoption of passwordless authentication and identity threat detection and response. He has experience working for both large cyber companies and small startups. He has an MBA from Emory University and a Bachelor's Degree in Physics from Bowdoin College.